The PCCET certification is a knowledge-based certification that validates candidates’ understanding of fundamental cybersecurity, network security, cloud security, and SOC security.
The PCCET certification is the first of its kind credential to cover foundational knowledge of industry recognized cybersecurity and network security concepts as well as various cutting-edge advancements across all Palo Alto Networks technologies. As the cybersecurity landscape becomes more complex, Palo Alto Networks Education Services has taken steps to align with industry standards following the NIST/NICE (National Institute of Standards and Technology/National Initiative for Cybersecurity Education) workforce framework.
The PCCET certification is designed for students, technical professionals, as well as any non-technical individuals interested in validating comprehensive knowledge on current cybersecurity tenets.
Palo Alto PCCET Exam Overview:
|Exam Name||Cybersecurity Entry-level Technician|
|Exam Price||$110 USD|
|Number of Questions||75|
|Passing Score||Variable (70-80 / 100 Approx.)|
|Recommended Training||Introduction to Cybersecurity
Fundamentals of Network Security
Fundamentals of Cloud Security
Fundamentals of SOC (Security Operations Center)
|Sample Questions||Palo Alto PCCET Sample Questions|
|Practice Exam||Palo Alto Networks Certified Cybersecurity Entry-level Technician Practice Test|
Palo Alto PCCET Exam Topics:
|Fundamentals of Cybersecurity||15%||
– Identify Web 2.0/3.0 applications and services
◉ List common Web 2.0/3.0 applications.
– Recognize applications used to circumvent port-based firewalls
◉ Identify applications by their port number.
– Summarize cloud computing challenges and best practices
◉ Define DevOps.
– Identify SaaS application risks
◉ Understand the nature of data being stored in the SaaS application.
– Recognize cybersecurity laws and regulations
◉ Understand the impact of governance regulation and compliance.
– List recent high-profile cyberattack examples
◉ List recent high-profile cyberattack examples.
– Discover attacker profiles and motivations.
◉ Identify the different attacker profiles.
– Describe the modern cyberattack life-cycle
◉ Understand the different phases of the modern cyber life-cycle.
– Classify malware types
◉ Classify the different types of malware.
– List the differences between vulnerabilities and exploits
◉ Order the steps on the vulnerability/exploit timeline.
– Categorize spamming and phishing attacks
◉ Differentiate between spamming and phishing attacks.
– Social Engineering
◉ Identify different methodologies for social engineering.
– Cybersecurity Attacks
◉ Differentiate between DoS and DDoS
– Define the characteristics of advanced persistent threats
◉ Understand advanced persistent threats.
– Recognize common Wi-Fi attacks
◉ Differentiate between different types of Wi-Fi attacks.
– Define perimeter-based network security
◉ Define perimeter-based network security.
– Explain Zero Trust design principles and architecture configuration
◉ Define Zero Trust.
– Define the capabilities of an effective Security Operating Platform
◉ Understand the integration of services for Network, Endpoint, and Cloud services.
– Recognize Palo Alto Networks Strata, Prisma, and Cortex Technologies
◉ Identify examples of Palo Alto Networks technologies associated with securing the enterprise.
|The Connected Globe||25%||
– Define the differences between hubs, switches, and routers
◉ Differentiate between hubs, switches and routers.
– Classify routed and routing protocols
◉ Identify routed protocols.
– Summarize area networks and topologies
◉ Identify the borders of collision domains.
– Explain the purpose of the Domain Name System (DNS)
◉ Understand the DNS hierarchy.
– Identify categories of Internet of Things (IoT)
◉ Identify IoT connectivity technologies.
– Illustrate the structure of an IPV4/IPV6 address
◉ Identify dotted decimal notation.
– Describe the purpose of IPV4 subnetting.
◉ Understand binary to decimal conversion.
– Illustrate the OSI and TCP/IP models
◉ Identify the order of the layers of both OSI and TCP/IP models.
– Explain the data encapsulation process
◉ Understand the data encapsulation process.
– Compare intrusion detection and intrusion prevention systems
◉ Understand the concept of intrusion detection systems.
– Define virtual private networks
◉ Define virtual private networks.
– Explain data loss prevention
◉ Define the purpose of data loss prevention.
– Describe unified threat management
◉ Differentiate between UTM and other portals logged into to do work.
– Define endpoint security basics
◉ Understand what is an endpoint.
– Compare signature and container-based malware protection
◉ Define signature-based malware protection.
– Recognize types of mobile device management
◉ Identify the capabilities of mobile device management.
– Explain the purpose of identity and access management
◉ Identify the As in the AAA model.
– Describe configuration management
◉ Understand configuration management.
– Identify next-generation firewall features and capabilities
◉ Differentiate between NGFWs and FWs.
– Compare the NGFW four core subscription services
◉ Differentiate between the four core NGFW subscription services.
– Define the purpose of network security management (Panorama)
◉ Define Panorama services and controls.
– Define the NIST cloud service and deployment models
◉ Define the NIST cloud service models.
– Recognize and list cloud security challenges
◉ Understand where vulnerabilities are in a shared community environment.
– Define the purpose of virtualization in cloud computing
◉ Define the types of hypervisors.
– Explain the purpose of containers in application deployment
◉ Understand the purpose of containers.
– Discuss the purpose of serverless computing
◉ Understand the purpose of serverless computing.
– Compare the differences between DevOps and DevSecOps
◉ Define DevOps.
– Explain governance and compliance related to deployment of SaaS applications
◉ Understand security compliance to protect data.
– Illustrate traditional data security solution weaknesses
◉ Understand the cost of maintaining a physical data center.
– Compare east-west and north-south traffic protection
◉ Define east-west traffic patterns.
– Recognize the four phases of hybrid data center security
◉ Define the four phases of hybrid data center security.
– List the four pillars of cloud application security (Prisma Cloud)
◉ Define cloud native security platform.
– Illustrate the Prisma Access SASE architecture
◉ Understand the concept of SASE.
– Compare sanctioned, tolerated and unsanctioned SaaS applications
◉ Define application use and behavior.
|Elements of Security Operations||30%||
– List the six essential elements of effective security operations
◉ Define the “Identify” SecOps function.
– Describe the purpose of security information and event management (SIEM) and SOAR
◉ Define SIEM.
– Describe the analysis tools used to detect evidence of a security compromise
◉ Define the analysis tools used to detect evidence of a security compromise.
– Describe features of Cortex XDR endpoint protection technology
◉ Understand the Cortex platform in a Security Operations environment.
– Describe how Cortex XSOAR improves SOC efficiency and how Cortex Data Lake improves SOC visibility
◉ Understand how Cortex XSOAR improves Security Operations efficiency.
– Explain how AutoFocus gains threat intelligence for security analysis and response.
◉ Understand how AutoFocus gains threat intelligence for security analysis and response.